Android: Deep look into Dalvik VM

E. Latifa, El Kiram Moulay Ahmed
{"title":"Android: Deep look into Dalvik VM","authors":"E. Latifa, El Kiram Moulay Ahmed","doi":"10.1109/WICT.2015.7489641","DOIUrl":null,"url":null,"abstract":"Today, Smartphones are very powerful, and many of its applications use wireless multimedia communications. Prevention from the external dangers (threats) has grown up to be a big concern for the experts these days. Android security has become a very important issue because of the unrestricted application it provides and the feature that make it very easy for anyone to develop and published it on Play store. Some work has previously been done on the Android security model, including numerous analyses of the model and frameworks aimed at enforcing security standards. In this article, we explain the architecture of Android operating system, we study and we look for a process model of Android's virtual machine Dalvik. We also study the liaison between the Dalvik virtual machine processes and the connection between the Dalvik processes and the processes of Android through analysis and research the role and the boot process of Zygote in Dalvik virtual machine startup process. This paper discusses an example of attacks based on Dalvik VM. By the end, we propose a simple system that can effectively detect Android's applications issues and solve them.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 5th World Congress on Information and Communication Technologies (WICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WICT.2015.7489641","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Today, Smartphones are very powerful, and many of its applications use wireless multimedia communications. Prevention from the external dangers (threats) has grown up to be a big concern for the experts these days. Android security has become a very important issue because of the unrestricted application it provides and the feature that make it very easy for anyone to develop and published it on Play store. Some work has previously been done on the Android security model, including numerous analyses of the model and frameworks aimed at enforcing security standards. In this article, we explain the architecture of Android operating system, we study and we look for a process model of Android's virtual machine Dalvik. We also study the liaison between the Dalvik virtual machine processes and the connection between the Dalvik processes and the processes of Android through analysis and research the role and the boot process of Zygote in Dalvik virtual machine startup process. This paper discusses an example of attacks based on Dalvik VM. By the end, we propose a simple system that can effectively detect Android's applications issues and solve them.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Android:深入研究Dalvik VM
今天,智能手机非常强大,它的许多应用程序使用无线多媒体通信。这些天来,预防外部危险(威胁)已成为专家们关心的一个大问题。Android的安全性已经成为一个非常重要的问题,因为它提供了不受限制的应用程序,并且它的特性使得任何人都可以很容易地开发和发布它在Play商店。之前已经在Android安全模型上做了一些工作,包括对模型和框架的大量分析,旨在执行安全标准。本文阐述了Android操作系统的体系结构,研究并寻找了Android虚拟机Dalvik的进程模型。通过分析和研究Zygote在Dalvik虚拟机启动过程中的作用和启动过程,研究Dalvik虚拟机进程之间的联系以及Dalvik进程与Android进程之间的联系。本文讨论了一个基于Dalvik虚拟机的攻击实例。最后,我们提出了一个简单的系统,可以有效地检测和解决Android应用程序的问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Study of the credibility of the information shared by a wireless sensor network A regulation model of urban traffic congestion: Algorithm and implementation Interdependencies modeling for the purpose of critical infrastructures protection Toward resilience management in critical information infrastructure A dynamic group privacy protection mechanism based on cloud model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1